The scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
اقرأ المزيد
This book synthesizes the most current literature and research on scientific inquiry and nature of science in K-12 instruction. ...
اقرأ المزيدThe profession of pharmacist and pharmacology is a science that researches drugs, their properties, the composition of drugs ...
اقرأ المزيدNeurotoxins are the main components of scorpion venom that are known to be responsible for the pathological manifestations ...
اقرأ المزيد
The first part of "Screw Compressors" gives a review of recent developments in screw compressor design.The second part ...
اقرأ المزيدThis book - the authors' second book on screw compressors – presents the results of the most up to date methods of three-dimensional ...
اقرأ المزيد
Presents actual design projects that have been implemented at various seaside locations Covers all aspects of seaside building, ...
اقرأ المزيد
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
اقرأ المزيد
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical ...
اقرأ المزيد
Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
اقرأ المزيد
This volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...
اقرأ المزيد
This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
اقرأ المزيد
Security in E-Learning is organized in three parts. Emphasizes that security is mainly an organizational and management issue. ...
اقرأ المزيد
Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
اقرأ المزيد
This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
اقرأ المزيد
These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
اقرأ المزيدIn view of the rapid changes in requirements, it has became necessary to place at the reader's disposal a book dealing with ...
اقرأ المزيد
This book introduces various types of self-adaptive parameters for evolutionary computation. Biased mutation for evolution ...
اقرأ المزيد
One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators ...
اقرأ المزيد
Provides a thorough overview of all techniques for producing self-healing construction materials. Construction materials ...
اقرأ المزيد